Artykuły w czasopismach na temat „Light weight cryptography”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Light weight cryptography”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Alshar’e, Marwan, Sharf Alzu’bi, Ahed Al-Haraizah, Hamzah Ali Alkhazaleh, Malik Jawarneh, and Mohammad Rustom Al Nasar. "Elliptic curve cryptography based light weight technique for information security." Bulletin of Electrical Engineering and Informatics 14, no. 3 (2025): 2300–2308. https://doi.org/10.11591/eei.v14i3.8587.
Pełny tekst źródłaAbd Zaid, Mustafa, and Soukaena Hassan. "Proposal Framework to Light Weight Cryptography Primitives." Engineering and Technology Journal 40, no. 4 (2022): 516–26. http://dx.doi.org/10.30684/etj.v40i4.1679.
Pełny tekst źródłaAhmed, Mubbashir. "Lightweight Cryptographic Algorithm Development Using Fundamental Cryptographic Techniques." VFAST Transactions on Software Engineering 13, no. 1 (2025): 178–92. https://doi.org/10.21015/vtse.v13i1.2050.
Pełny tekst źródłaAlkhudaydi, Malak G., and Adnan A. Gutub. "Integrating Light-Weight Cryptography with Diacritics Arabic Text Steganography Improved for Practical Security Applications." Journal of Information Security and Cybercrimes Research 3, no. 1 (2020): 13–30. http://dx.doi.org/10.26735/fmit1649.
Pełny tekst źródłaRaja, M., Dr S. Dhanasekaran, and Dr V. Vasudevan. "Light Weight Cryptography based Medical Data and Image Encryption Scheme." Webology 18, no. 2 (2021): 88–104. http://dx.doi.org/10.14704/web/v18i2/web18309.
Pełny tekst źródłaSangari, S., and Martin Leo Manickam. "A LIGHT-WEIGHT CRYPTOGRAPHY ANALYSIS FOR WIRELESS BASED HEALTHCARE APPLICATIONS." Journal of Computer Science 10, no. 10 (2014): 2088–94. http://dx.doi.org/10.3844/jcssp.2014.2088.2094.
Pełny tekst źródłaB, Akhil, Muzammil Shareef Md, Shalini B, Fairooz SK, and Shaik Mohammed Rafi. "Light weight security coding using PRESENT algorithm for cryptography application." International Journal of VLSI and Signal Processing 7, no. 2 (2020): 1–5. http://dx.doi.org/10.14445/23942584/ijvsp-v7i2p101.
Pełny tekst źródłaYalamanchili, Anjani, D. Venkatasekhar, and G. Vijay Kumar. "Iot Based Alzheimer’s Disease Diagnosis Model for Providing Security Using Light Weight Hybrid Cryptography." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 4 (2023): 148–59. http://dx.doi.org/10.17762/ijritcc.v11i4.6398.
Pełny tekst źródłaAlassaf, Norah, and Adnan Gutub. "Simulating Light-Weight-Cryptography Implementation for IoT Healthcare Data Security Applications." International Journal of E-Health and Medical Communications 10, no. 4 (2019): 1–15. http://dx.doi.org/10.4018/ijehmc.2019100101.
Pełny tekst źródłaMS, Dhruva, Gururaj H L, and Ramesh B. "Cryptography Based Light-Weight Attribute Encryption Scheme for Internet of Things." International Journal of Engineering and Applied Computer Science 02, no. 05 (2017): 160–64. http://dx.doi.org/10.24032/ijeacs/0205/03.
Pełny tekst źródłaBaskar, Chanthini, Balasubramaniyan C., and Manivannan D. "Establishment of Light Weight Cryptography for Resource Constraint Environment Using FPGA." Procedia Computer Science 78 (2016): 165–71. http://dx.doi.org/10.1016/j.procs.2016.02.027.
Pełny tekst źródłaKarrothu, Aravind, and Jasmine Norman. "A systematic analysis of identity based encryption (IBE)." International Journal of Knowledge-based and Intelligent Engineering Systems 25, no. 3 (2021): 343–56. http://dx.doi.org/10.3233/kes-210078.
Pełny tekst źródłaArafat, Jahidul, Md Abdul, and Tazkia Binty. "A Light Weight Cryptography (LWC) for Small Scale Data in IoT Devices." International Journal of Computer Applications 182, no. 49 (2019): 29–35. http://dx.doi.org/10.5120/ijca2019918758.
Pełny tekst źródłaGunasekaran, Elavarasi, and Vanitha Muthuraman. "Light Weight Cryptography Based Encrypted Multiple Secret Share Creation for Biometrics Images." Journal of Computational and Theoretical Nanoscience 17, no. 12 (2020): 5469–76. http://dx.doi.org/10.1166/jctn.2020.9441.
Pełny tekst źródłaSri Lakshmi, M., and V. Srikanth. "A Study on Light Weight Cryptography Algorithms for Data Security in IOT." International Journal of Engineering & Technology 7, no. 2.7 (2018): 887. http://dx.doi.org/10.14419/ijet.v7i2.7.11088.
Pełny tekst źródłaDong, Pham-Khoi, Khanh N. Dang, Duy-Anh Nguyen, and Xuan-Tu Tran. "A light-weight neuromorphic controlling clock gating based multi-core cryptography platform." Microprocessors and Microsystems 106 (April 2024): 105040. http://dx.doi.org/10.1016/j.micpro.2024.105040.
Pełny tekst źródłaKim, Sung-Gon, Hyun-Min Kim, and Seok-Hie Hong. "Research on efficient HW/SW co-design method of light-weight cryptography using GEZEL." Journal of the Korea Institute of Information Security and Cryptology 24, no. 4 (2014): 593–605. http://dx.doi.org/10.13089/jkiisc.2014.24.4.593.
Pełny tekst źródłaKhan, Muhammad Imran. "Light-weight Security Protocol in IoT with Less Computational Cost." Quaid-e-Awam University Research Journal of Engineering, Science & Technology 20, no. 1 (2022): 21–28. http://dx.doi.org/10.52584/qrj.2001.04.
Pełny tekst źródłaKodada, Basappa B., and Demian Antony D’Mello. "Symmetric Key Cryptosystem based on Sequential State Machine." IOP Conference Series: Materials Science and Engineering 1187, no. 1 (2021): 012026. http://dx.doi.org/10.1088/1757-899x/1187/1/012026.
Pełny tekst źródłaSangeetha Supriya Kola, Et al. "Review on Lightweight Cryptography Techniques and Steganography Techniques for IOT Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 3436–44. http://dx.doi.org/10.17762/ijritcc.v11i9.9552.
Pełny tekst źródłaPark, Won-kyu, Guillermo Pallares Cebrian, Sung-joon Kim, Kang-hyun Lee, Dae-woon Lim, and Ki-soon Yu. "A Study on the Throughput Enhancement in Software Implementation of Ultra Light-Weight Cryptography PRESENT." Journal of Korean Institute of Communications and Information Sciences 42, no. 2 (2017): 316–22. http://dx.doi.org/10.7840/kics.2017.42.2.316.
Pełny tekst źródłaS. Chithra, Dr, Dr N. Bhalaji, and S. Nandini. "A Lightweight Trust Scheme for Iot." International Journal of Engineering & Technology 7, no. 3.34 (2018): 241. http://dx.doi.org/10.14419/ijet.v7i3.34.18974.
Pełny tekst źródłaArulkarthick, Dr V. J. "High-performance Block Cipher Using Flexible Architecture." International Academic Journal of Science and Engineering 6, no. 1 (2021): 188–93. http://dx.doi.org/10.9756/iajse/v6i1/1910019.
Pełny tekst źródłaKhadji, Marwa, Samira Kholji, Salmane Bourekkadi, and Mohamed Larbi kerkeb. "Sustainable MapReduce: Optimizing Security and Efficiency in Hadoop Clusters with Lightweight Cryptography-based Key Management." E3S Web of Conferences 412 (2023): 01065. http://dx.doi.org/10.1051/e3sconf/202341201065.
Pełny tekst źródłaHakeem, Shimaa A. Abdel, Mohamed A. Abd El-Gawad, and HyungWon Kim. "Comparative Experiments of V2X Security Protocol Based on Hash Chain Cryptography." Sensors 20, no. 19 (2020): 5719. http://dx.doi.org/10.3390/s20195719.
Pełny tekst źródłaLiu, Chen, Hoda Aghaei Khouzani, and Chengmo Yang. "ErasuCrypto: A Light-weight Secure Data Deletion Scheme for Solid State Drives." Proceedings on Privacy Enhancing Technologies 2017, no. 1 (2017): 132–48. http://dx.doi.org/10.1515/popets-2017-0009.
Pełny tekst źródłaPadmashree, M. G., J. S. Arunalatha, and K. R. Venugopal. "EBASKET: ECC Blended Authentication and Session Key Establishment Technique for IoT." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 10, no. 11 (2021): 20–28. https://doi.org/10.35940/ijitee.K9461.09101121.
Pełny tekst źródłaToy, Noel, and Senthilnathan T. "Light weight authentication protocol for WSN using ECC and hexagonal numbers." Indonesian Journal of Electrical Engineering and Computer Science 15, no. 1 (2019): 443. http://dx.doi.org/10.11591/ijeecs.v15.i1.pp443-450.
Pełny tekst źródłaJadaun, Abha, Satish Kumar Alaria, and Yashika Saini. "Comparative Study and Design Light Weight Data Security System for Secure Data Transmission in Internet of Things." International Journal on Recent and Innovation Trends in Computing and Communication 9, no. 3 (2021): 28–32. http://dx.doi.org/10.17762/ijritcc.v9i3.5476.
Pełny tekst źródłaVijai, Anand Ramar, and Kumar R. Veerandra. "ENHANCING DATA PRIVACY AND SECURITY IN CLOUD HEALTHCARE SOLUTIONS USING ELLIPTIC CURVE CRYPTOGRAPHY (ECC)." International Journal Of Engineering Technology Research & Management (IJETRM) 03, no. 05 (2019): 133–43. https://doi.org/10.5281/zenodo.15600580.
Pełny tekst źródłaEt. al., Harish Kumar N,. "Mutual authentication and data security in IOT using hybrid mac id and elliptical curve cryptography." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 501–7. http://dx.doi.org/10.17762/turcomat.v12i11.5913.
Pełny tekst źródłaSuryateja, Pericherla Satya, and Dr Kasukurthi Venkata Rao. "Performance Evaluation of Contemporary Block Ciphers for IoT Applications." Journal of Internet Services and Information Security 15, no. 1 (2025): 16–31. https://doi.org/10.58346/jisis.2025.i1.002.
Pełny tekst źródłaShakya, Subarna. "A Perspective Review of Security Issues in IoT with Cloud Environment." Journal of ISMAC 4, no. 2 (2022): 84–93. http://dx.doi.org/10.36548/jismac.2022.2.002.
Pełny tekst źródłaYadav, G. Vidhisha, N. Ramanjaneya Reddy, and U. Sesadri. "Performance Analysis of Malicious nodes on Multi hop Cellular Networks." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 11, no. 7 (2013): 2752–58. http://dx.doi.org/10.24297/ijct.v11i7.3473.
Pełny tekst źródłaParmar, Martin, and Parth Shah. "Internet of things-blockchain lightweight cryptography to data security and integrity for intelligent application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4422. http://dx.doi.org/10.11591/ijece.v13i4.pp4422-4431.
Pełny tekst źródłaMartin, Parmar, and Shah Parth. "Internet of things-blockchain lightweight cryptography to data security and integrity for intelligent application." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 4 (2023): 4422–31. https://doi.org/10.11591/ijece.v13i4.pp4422-4431.
Pełny tekst źródłaJammula, Mounika. "Comparative Study on DES and Triple DES Algorithms and Proposal of a New Algorithm Named Ternary DES for Digital Payments." Asian Journal of Applied Science and Technology 06, no. 01 (2022): 89–98. http://dx.doi.org/10.38177/ajast.2022.6111.
Pełny tekst źródłaWoud, M. Abed. "A DNA-based Privacy-preserving Scheme in Smart-grid." International Journal on Cryptography and Information Security (IJCIS) 9, no. 3 (2019): 1–10. https://doi.org/10.5281/zenodo.3473019.
Pełny tekst źródłaMonica Mehrotra, Md Shamsul Haque Ansari,. "Lightweight Cryptography based Communication Model for Device Identification, Mutual Authentication, and Encryption in a Smart City Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (2023): 986–94. http://dx.doi.org/10.17762/ijritcc.v11i9.8989.
Pełny tekst źródłaHakeem, Shimaa A. Abdel, and HyungWon Kim. "Multi-Zone Authentication and Privacy-Preserving Protocol (MAPP) Based on the Bilinear Pairing Cryptography for 5G-V2X." Sensors 21, no. 2 (2021): 665. http://dx.doi.org/10.3390/s21020665.
Pełny tekst źródłaM.R.Sheeba and G.Suganthi. "An Efficient Authentication Scheme Based on Mutual Verification for IoT Devices in Cloud Computing Environment." International Journal of Innovative Technology and Exploring Engineering (IJITEE) 11, no. 4 (2022): 1–11. https://doi.org/10.35940/ijitee.C9764.0311422.
Pełny tekst źródłaAttah, Amankwah. "Mitigating Electromagnetic Side-Channel Attacks." Advances in Multidisciplinary and scientific Research Journal Publication 1, no. 1 (2022): 71–76. http://dx.doi.org/10.22624/aims/crp-bk3-p12.
Pełny tekst źródłaChen, Yanan, Zhenyu Lu, Hu Xiong, and Weixiang Xu. "Privacy-Preserving Data Aggregation Protocol for Fog Computing-Assisted Vehicle-to-Infrastructure Scenario." Security and Communication Networks 2018 (2018): 1–14. http://dx.doi.org/10.1155/2018/1378583.
Pełny tekst źródłaBharathi Malakreddy A., Vani G. "An Algorithm to Increase the Attached Complexity and Time Consumption for Iot Healthcare Applications Based on the Truncated Quantum Hashed Method." Tuijin Jishu/Journal of Propulsion Technology 44, no. 4 (2023): 7594–99. http://dx.doi.org/10.52783/tjjpt.v44.i4.2614.
Pełny tekst źródłaJohn, Jacob. "Performance Analysis of New Light Weight Cryptographic Algorithms." IOSR Journal of Computer Engineering 5, no. 5 (2012): 01–04. http://dx.doi.org/10.9790/0661-0550104.
Pełny tekst źródłaKarode, Atul H., Shekhar R. Suralkar, and Vaishali B. Patil. "Performance Evaluation of Light Weight Cryptographic CLEFIA Algorithm." International Journal of Electronics and Communication Engineering 10, no. 8 (2023): 48–58. http://dx.doi.org/10.14445/23488549/ijece-v10i8p105.
Pełny tekst źródłaChangalvala, Raghu, Brandon Fedoruk, and Hafiz Malik. "Radar Data Integrity Verification Using 2D QIM-Based Data Hiding." Sensors 20, no. 19 (2020): 5530. http://dx.doi.org/10.3390/s20195530.
Pełny tekst źródłaP, Latha, and Andhe Pallavi. "Light Weight Cryptographic Algorithms- A Comparison for IoT Sensor Data." JNNCE Journal of Engineering and Management 6, no. 1 (2022): 117–20. http://dx.doi.org/10.37314/jjem.2022.060117.
Pełny tekst źródłaMaria, Rina, and V. Anitha. "Light Weight Asymmetric Cryptographic Algorithm for Financial Transactions through Mobile Application." International Journal of Computer Applications 170, no. 3 (2017): 37–41. http://dx.doi.org/10.5120/ijca2017914763.
Pełny tekst źródłaAlassaf, Norah, Adnan Gutub, Shabir A. Parah, and Manal Al Ghamdi. "Enhancing speed of SIMON: A light-weight-cryptographic algorithm for IoT applications." Multimedia Tools and Applications 78, no. 23 (2018): 32633–57. http://dx.doi.org/10.1007/s11042-018-6801-z.
Pełny tekst źródła